While core executive teams may be granted secure devices that are enrolled and securely managed through an enterprise mobility management (EMM) solution
Browsing: Identity and access management (IAM)
Cloud Adoption – 11 per cent of respondents indicated that Heartbleed, breaches and Snowden have significantly altered their cloud adoption plans
Network Access Control (NAC) is one of the longest standing and most effective security technologies in the industry.
Chiswick School has replaced its Wi-Fi network with a Meru Education-grade wireless solution to support its mobile learning strategy and Apple iPad rollout.
Information Security education and acceptance, after all, will likely do more for enterprise security than any single network appliance they could install.
The conference will explore the transition of Identity & Access Management from traditional IT infrastructure to a critical business intelligence resource.
UK office workers have trouble deciding who to trust, however this isn’t surprising considering 14 percent have already been badly affected by cybercrime
Biometrics are nothing new to the IAM space, yet it seems that security measures like fingerprint readers were reserved for highly regulated industries
No doubt the debate on the merits of Open Source versus proprietary software, particularly in terms of preventing bugs and security holes
Foreign intelligence agencies are targeting IT workers at big businesses, hoping to recruit them and gain privileged access to sensitive computer systems.